Internet-Draft Resinfo DNSSEC September 2024
Bortzmeyer Expires 23 March 2025 [Page]
Workgroup:
Internet Engineering Task Force
Internet-Draft:
draft-bortzmeyer-resinfo-dnssecval-01
Published:
Intended Status:
Informational
Expires:
Author:
S. Bortzmeyer
Afnic

DNS Resolver Information Key for DNSSEC Validation

Abstract

This document specifies a DNS Resolver Information Key (RFC 9606) for DNSSEC validation capability, "dnssecval".

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 23 March 2025.

Table of Contents

1. Introduction

RFC 9606 specifies a DNS resource record (RR) type RESINFO to allow resolvers to publish information about their capabilities and policies. This information is encoded as {key, value} pairs, with each information is unambiguously identified with a key. Keys are maintained in an IANA registry. This specification adds a new key, to indicate that the resolver validates with DNSSEC [RFC4033][RFC4034][RFC4035].

Such key may be used, for example, by a DNS client to prefer resolvers that enable DNSSEC validation.

1.1. Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

2. The key "dnssecval"

The name of the key is "dnssecval", for "DNSSEC validating [resolver]". The presence of this key indicates that the DNS resolver validates all answers with DNSSEC [RFC4033] [RFC4034] [RFC4035]. Note that, per the rules for the keys defined in Section 6.4 of [RFC6763] if there is no '=' in a key, then it is a boolean attribute, simply identified as being present, with no value.

A resolver that announces this capability in a RESINFO record MAY add DNSSEC-specific EDE (Extended DNS Error Codes, [RFC8914]) to the value of the "exterr" key, e.g., "Unsupported DNSKEY Algorithm", "Unsupported DS Digest Type", and "DNSSEC Bogus". Refer to the "Extended DNS Error Codes" registry for a definitive list of these EDEs.

3. IANA Considerations

TODO find how to make a table with XML, to do like RFC 9606

This document requests IANA to add the key "dnssecval", with the explanation text "The presence of the key name indicates that DNSSEC validation is enabled", and a reference to this document to the registry "DNS Resolver Information Keys" under the "Domain Name System (DNS) Parameters" registry group.

4. Security Considerations

DNSSEC is a very important tool for the security of the DNS. Therefore it is important for users to know in advance whether the resolver they consider supports DNSSEC. It would be better to assume that every resolver validates (thus rendering this document useless) but it is not the case today.

As with any information published in the DNS, the key in the RESINFO may be wrong or outdated. They should be regarded with care. The security considerations discussed in Section 7 of [RFC9606] apply.

5. References

5.1. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC6763]
Cheshire, S. and M. Krochmal, "DNS-Based Service Discovery", RFC 6763, DOI 10.17487/RFC6763, , <https://www.rfc-editor.org/info/rfc6763>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/info/rfc8174>.
[RFC9606]
Reddy.K, T. and M. Boucadair, "DNS Resolver Information", RFC 9606, DOI 10.17487/RFC9606, , <https://www.rfc-editor.org/info/rfc9606>.

5.2. Informative References

[RFC4033]
Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, "DNS Security Introduction and Requirements", RFC 4033, DOI 10.17487/RFC4033, , <https://www.rfc-editor.org/info/rfc4033>.
[RFC4034]
Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, "Resource Records for the DNS Security Extensions", RFC 4034, DOI 10.17487/RFC4034, , <https://www.rfc-editor.org/info/rfc4034>.
[RFC4035]
Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, "Protocol Modifications for the DNS Security Extensions", RFC 4035, DOI 10.17487/RFC4035, , <https://www.rfc-editor.org/info/rfc4035>.
[RFC8914]
Kumari, W., Hunt, E., Arends, R., Hardaker, W., and D. Lawrence, "Extended DNS Errors", RFC 8914, DOI 10.17487/RFC8914, , <https://www.rfc-editor.org/info/rfc8914>.

Acknowledgements

Original idea by Marco Davids.

Author's Address

Stéphane Bortzmeyer
Afnic
7 avenue du 8 mai 1945
78280 Guyancourt
France